Get Free Shipping on orders over $79
Complete Guide to CISM Certification - Justin Peltier

Complete Guide to CISM Certification

By: Justin Peltier, Thomas R. Peltier

Hardcover | 13 December 2006 | Edition Number 1

At a Glance

Hardcover


$361.75

or 4 interest-free payments of $90.44 with

 or 

Ships in 15 to 25 business days

The Certified Information Security Manager(R)(CISM(R)) certification program was developed by the Information Systems Audit and Controls Association (ISACA(R)). It has been designed specifically for experienced information security managers and those who have information security management responsibilities. The Complete Guide to CISM(R) Certification examines five functional areas-security governance, risk management, information security program management, information security management, and response management.

Presenting definitions of roles and responsibilities throughout the organization, this practical guide identifies information security risks. It deals with processes and technical solutions that implement the information security governance framework, focuses on the tasks necessary for the information security manager to effectively manage information security within an organization, and provides a description of various techniques the information security manager can use. The book also covers steps and solutions for responding to an incident. At the end of each key area, a quiz is offered on the materials just presented. Also included is a workbook to a thirty-question final exam.

Complete Guide to CISM(R) Certification describes the tasks performed by information security managers and contains the necessary knowledge to manage, design, and oversee an information security program. With definitions and practical examples, this text is ideal for information security managers, IT auditors, and network and system administrators.

Industry Reviews

"Developed by Information Systems Audit and Controls Association, The Certified Information Security Manager certification program is aimed towards information security managers with five or more years of prior experience in enterprise information security management. ... have structured their book along the same lines a s the certification class, presenting advanced information on information security governance, information security risk management, information security program management, information security management, and response management. ..."
- In Book News Inc., June 2007

More in Data Encryption

Computer Security : Art and Science - Dariel Wyatt
Foundations of Information Security - Liam Lewis
Cybersecurity All-in-One For Dummies : For Dummies - Joseph Steinberg
Supremacy : AI, ChatGPT and the Race that Will Change the World - Parmy Olson
Crafting an Information Security Playbook - Brandon Enright

RRP $95.00

$43.75

54%
OFF
Principles of Information Security : 7th edition - Michael E. Whitman

RRP $167.95

$129.99

23%
OFF
Hackers & Painters - Paul Graham

RRP $47.75

$26.75

44%
OFF
Mitigating the Risks of AI Deepfakes - Malka N. Halgamuge

RRP $231.00

$202.75

12%
OFF
Unveiling the Art of Steganography : A Modern Approach - Manoj Kumar